Sciweavers

5723 search results - page 994 / 1145
» Network Management
Sort
View
CLEF
2010
Springer
15 years 5 months ago
A Cluster-Based Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
Du Zou, Wei-jiang Long, Zhang Ling
POPL
2012
ACM
13 years 11 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
16 years 4 months ago
An event-based framework for characterizing the evolutionary behavior of interaction graphs
Interaction graphs are ubiquitous in many fields such as bioinformatics, sociology and physical sciences. There have been many studies in the literature targeted at studying and m...
Sitaram Asur, Srinivasan Parthasarathy, Duygu Ucar
123
Voted
GROUP
2009
ACM
15 years 10 months ago
Grounding interpersonal privacy in mediated settings
Recent technologies supporting continuous connectivity enable sustained awareness within social networks, which eventually boosts interaction and therefore the need of individuals...
Natalia A. Romero, Panos Markopoulos
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 10 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz